OAM DMA hijacking: Difference between revisions

Jump to navigation Jump to search
Content added Content deleted
No edit summary
Line 52: Line 52:
ld a,(FFD3) ; a=random "D-sum" byte 1 number.
ld a,(FFD3) ; a=random "D-sum" byte 1 number.
ld (FFF8),a ; put a into FFF8, which controls what buttons are being pressed.
ld (FFF8),a ; put a into FFF8, which controls what buttons are being pressed.
"ret" ; Don't execute any code after D350.
ret ; Don't execute any code after D350.


This example is a simulation of RNG Plays Pokémon, but the routine at D34A can be adjusted for different inputs into FFF8.
This example is a simulation of RNG Plays Pokémon, but the routine at D34A can be adjusted for different inputs into FFF8.